An attack that attempts to deny corporate computing resources to legitimate users is a ______________.
A. virus
B. denial of service
C. worm
D. Trojan
E. replay attack
Answer: B
Computer Science & Information Technology
You might also like to view...
Press ____ to open the Save As dialog box.
a. CTRL+S b. SHIFT+S c. SHIFT+CTRL+S d. ALT+S
Computer Science & Information Technology
When you work in Design view, pressing ____ creates a paragraph element and a line of white space.
A. [Enter] B. [Shift][Enter] C. [Ctrl][Enter] D. [Alt][Enter]
Computer Science & Information Technology
It will take a computer ____ to crack a password with a length of three characters if the computer tries one million values per second.
A. .008788 seconds B. 4.5 seconds C. 2.5 hours D. 58 hours
Computer Science & Information Technology
A(n) ____________________ assigned during incident management indicates how serious a problem is and how many users are affected.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology